Описание
Elixir can leak information due to weak use of crypto
Elixir prior to and including 0.7.1 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database. A patch has been attached to the initial advisory to mitigate this vulnerability.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2012-2146
- https://bugzilla.redhat.com/show_bug.cgi?id=810013
- https://github.com/pypa/advisory-database/tree/main/vulns/elixir/PYSEC-2012-13.yaml
- http://elixir.ematia.de/trac/ticket/119
- http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1
- http://www.openwall.com/lists/oss-security/2012/04/27/8
- http://www.openwall.com/lists/oss-security/2012/04/28/2
- http://www.openwall.com/lists/oss-security/2012/04/29/1
Пакеты
Elixir
<= 0.7.1
Отсутствует
Связанные уязвимости
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique i ...